Supawiki Security & Risk Analysis

wordpress.org/plugins/supawiki

Export WordPress data to Supawiki.

0 active installs v1.0.1 PHP + WP 4.2.0+ Updated May 10, 2024
bloggingexportjsonmigratesupawiki
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Supawiki Safe to Use in 2026?

Generally Safe

Score 92/100

Supawiki has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The Supawiki plugin v1.0.1 demonstrates a strong security posture based on the provided static analysis and vulnerability history. The absence of any identified attack surface entry points, dangerous functions, or unsanitized taint flows is highly commendable. Furthermore, all SQL queries utilize prepared statements, and all output is properly escaped, which are critical best practices for preventing common web vulnerabilities like SQL injection and Cross-Site Scripting (XSS). The plugin also shows a commitment to security by performing capability checks, although the absence of nonce checks on its limited entry points is a minor concern.

The plugin's vulnerability history is equally impressive, with no recorded CVEs of any severity. This indicates a history of secure development and diligent maintenance. While the static analysis reveals no obvious vulnerabilities, the complete lack of identified attack vectors and taint flows in version 1.0.1 suggests that if any vulnerabilities were present in earlier versions, they have been effectively mitigated. The presence of file operations, while not inherently risky, warrants careful implementation to ensure no unintended consequences.

In conclusion, Supawiki v1.0.1 appears to be a very secure plugin. The developers have implemented robust security measures, and there is no historical evidence of significant vulnerabilities. The primary area for potential minor improvement would be the introduction of nonce checks for any future or existing limited entry points, although the current analysis suggests these are not exposed. The overall security of the plugin is excellent.

Key Concerns

  • No Nonce Checks on Entry Points
Vulnerabilities
None known

Supawiki Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Supawiki Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
21 escaped
Nonce Checks
0
Capability Checks
1
File Operations
6
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped21 total outputs
Attack Surface

Supawiki Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actioninitclass-supawiki.php:73
actionadmin_menuclass-supawiki.php:76
actionadmin_enqueue_scriptsclass-supawiki.php:79
actionadmin_enqueue_scriptsclass-supawiki.php:80
actioninitclass-supawiki.php:83
actioninitclass-supawiki.php:87
filterplugin_action_links_supawiki/supawiki.phpclass-supawiki.php:91
filterintermediate_image_sizesclass-supawiki.php:93
Maintenance & Trust

Supawiki Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedMay 10, 2024
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Supawiki Developer Profile

Rodrigo Pedroso Leite Pinto

1 plugin · 0 total installs

88
trust score
Avg Security Score
92/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Supawiki

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/supawiki/css/admin.css/wp-content/plugins/supawiki/js/admin.js/wp-content/plugins/supawiki/css/public.css/wp-content/plugins/supawiki/js/public.js
Script Paths
/wp-content/plugins/supawiki/js/admin.js/wp-content/plugins/supawiki/js/public.js
Version Parameters
supawiki/css/admin.css?ver=supawiki/js/admin.js?ver=supawiki/css/public.css?ver=supawiki/js/public.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Supawiki